SlideShare a Scribd company logo
1 of 19
1
Security First: IoT
Hugo Fiennes, Co-founder & CEO, electric imp
Security First
When you’re making a connected product, or a service that deals with
connected products and their data, you need to consider security before
any other aspect.
Including privacy.
Without security, there cannot be privacy.
2
Why? This sort of thing is bad…
3
Really, hackers are only just getting started with the IoT…
4
0
5
10
15
20
defcon 18 defcon 19 defcon 20 defcon 21 defcon 22
Number of IoT related sessions at the
last 5 DEFCON conferences
iot/scada car consumer embedded
Why are there so many insecure connected products?
• Security is not an area most product companies have experience with
• They need to find and hire appropriate experts…
• …and empower them to do possibly costly things with no immediate ROI
• Product companies usually work serially:
• Make product n, test/debug/optimize, ship
• Make product n+1, test/debug/optimize, ship
• Make product n+2, test/debug/optimize, ship
5
Security is iterative, never “done”
• Build/ship/forget only works when products don’t need to be updated
• Generally, a manufacturer will only see a product again if it fails.
• The entire engineering function is often not architected for sustaining engineering.
• It fails to work with connected products
• They do not ship into a static world
• Threats and exploits change and evolve over time
• The customer expects – and trusts the brand – to provide the same quality experience
long after the product was purchased
6
Dystopian future: consumer IoT in 5 years
• Your home has become a wretched hive of scum and villainy
• We must be cautious
• Those cheap chinese power monitors you bought from eBay will
be sending 419 spam.
• Your dishwasher will be locked in a firmware upgrade loop.
• Your lights can only be controlled by the phone you stopped
using 4 years ago.
7
Hmm.
So that was depressing.
What can be done?
8
The first rule of IoT (club)…
Products must be able to be upgraded securely, without end-user intervention.
9
(see: Belkin WeMo, Dlink,
Almost every home router…)
Second rule: start at product definition
• Feature set
• How can each feature be implemented securely, without breaking
either the functionality or the user experience?
• Setup process
• How can a device be provisioned securely, and the ownership of the
device be established?
• Data flows
• What is the appropriate level of protection for data flowing both
from and to the device?
10
Third rule: budget for it
• Security maintenance is not free
• It’s better than the alternative, though
• Damage to your reputation is hard to price.
• You need to be able to provide updates for the product lifetime
• This means being able to regression test firmware and products that may have
been out of production for many years.
• This requires quite a bit of development discipline.
• Ideally, having a way to safely EOL a product is good
11
Security and things: Threat model
• What attacks am I concerned about?
• Physical: when attacker has physical access to the device
• Local: when attacker has direct network access to the device
• MITM: when attacker is between device and network
• Server: when attacker targets the host service
• What areas are high vulnerability?
• Configuration/setup/provisioning modes are often less tested
• Remnants of factory test modes are often insecure
• How much cost can my design bear?
• There are always trade-offs
12
Security and things: Attack surface
• The attack surface is the sum of all the possible vectors that could be
used to compromise security
• The smaller the attack surface, the easier it is to secure a product
• A typical attack surface consists of several areas:
• Hardware: JTAG, external memories, debug console, ISP/test connectors
• Software: buffer overruns in bootloader, malformed TCP packets, illegal TLS
negotiations or options, diagnostic modes, local control interfaces
• Network: malformed link packets, insufficient entropy for key generation,
diagnostic/setup ports, simplistic authentication schemes, etc
• Once an entry point has been secured, the size of the attack surface is
often irrelevant
13
Example: Physical security
Nothing is totally secure. Your job is to pick an appropriate level of paranoia.
This often does not need to be an expensive effort.
14
Level Cost
per unit
Cost to
hack
Notes
Zero $0.00 $0 Insecure bootloader, exposed JTAG or console UART, etc
One $0.00 $1000+ Remove JTAG/console test points, remove your backdoors
Two $0.25+ $100,000+ JTAG disabled with OTP fuse, secure bootloader, memory
protection deployed appropriately
Three $0.50+ ??? Unique, per-device authentication/encryption
Security and things: Replicability
• The most damaging hacks are the ones that can be replicated easily
• It can be cost-prohibitive to prevent attackers with physical access from at least
compromising the normal operation of a system
• …but if an attacker with physical access can find a weakness and use it to
devise an attack that does not require physical access, that’s bad.
• For example:
• Network attacks (buffer overflows, malformed data, etc)
• MITM attacks (snoop on or alter traffic to/from devices)
• Leaks of secrets shared by all devices (eg symmetric encryption keys)
15
The last rule: Build, or buy, a platform
Separating the application from the platform is a good thing.
The platform remains common across products, reducing the cost of maintenance
for each product and justifying more work on hardening the attack surface.
This also insulates the application from the hardware, allowing consistency in
development even for product refreshes and cost reductions.
16
Where What
Application Application-specific logic, UI
Platform Network stack, OS, drivers
Hardware Physical security
With a good architecture,
most of the security work
happens here
Contractual Electric Imp mention
Electric Imp is a cloud platform for people to build connected devices with.
We deal with things like long-term maintenance, security, scalability,
compatibility, link maintenance, cloud-based middleware, stupid routers
and hardware abstraction.
We work with people who want to build great connected products or
services, but who rightly believe that spending all their time debugging
networking and fixing security holes isn’t a good commercial strategy.
17
Q&A
(btw, I have slides from ARM techcon if you want a much more technical view –
please ask!)
ps: we are hiring…
18
www.electricimp.com
connectivity made simple
19

More Related Content

What's hot

Intro to the Internet of Things using Netduino
Intro to the Internet of Things using NetduinoIntro to the Internet of Things using Netduino
Intro to the Internet of Things using NetduinoDean Willson
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP camHermesDDS
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017Keith Harris
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secureclcewing
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNitesh Malviya
 
Null mumbai-iot top 10
Null mumbai-iot top 10Null mumbai-iot top 10
Null mumbai-iot top 10Nitesh Malviya
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsKeith Harris
 
Building IoT devices with ARM mbed - RISE Manchester
Building IoT devices with ARM mbed - RISE ManchesterBuilding IoT devices with ARM mbed - RISE Manchester
Building IoT devices with ARM mbed - RISE ManchesterJan Jongboom
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeterTempered
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Keith Harris
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12ashleyiras
 
STANLEY healthcare IOT
STANLEY healthcare IOTSTANLEY healthcare IOT
STANLEY healthcare IOTYael Malki
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Keith Harris
 
SCTE On-Line Live Learning Presentation
SCTE On-Line Live Learning PresentationSCTE On-Line Live Learning Presentation
SCTE On-Line Live Learning Presentationguestacc36c0
 
Extending Cisco Technologies Thru Solar Winds Network Management
Extending Cisco Technologies Thru Solar Winds Network ManagementExtending Cisco Technologies Thru Solar Winds Network Management
Extending Cisco Technologies Thru Solar Winds Network Managementjkstephens
 

What's hot (19)

Intro to the Internet of Things using Netduino
Intro to the Internet of Things using NetduinoIntro to the Internet of Things using Netduino
Intro to the Internet of Things using Netduino
 
wifi
wifiwifi
wifi
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secure
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
Null mumbai-iot top 10
Null mumbai-iot top 10Null mumbai-iot top 10
Null mumbai-iot top 10
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
Building IoT devices with ARM mbed - RISE Manchester
Building IoT devices with ARM mbed - RISE ManchesterBuilding IoT devices with ARM mbed - RISE Manchester
Building IoT devices with ARM mbed - RISE Manchester
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12
 
STANLEY healthcare IOT
STANLEY healthcare IOTSTANLEY healthcare IOT
STANLEY healthcare IOT
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 
SCTE On-Line Live Learning Presentation
SCTE On-Line Live Learning PresentationSCTE On-Line Live Learning Presentation
SCTE On-Line Live Learning Presentation
 
Extending Cisco Technologies Thru Solar Winds Network Management
Extending Cisco Technologies Thru Solar Winds Network ManagementExtending Cisco Technologies Thru Solar Winds Network Management
Extending Cisco Technologies Thru Solar Winds Network Management
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 

Viewers also liked

Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature
Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature
Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature DataWorks Summit
 
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...DataWorks Summit/Hadoop Summit
 
Apache Kylin - OLAP Cubes for SQL on Hadoop
Apache Kylin - OLAP Cubes for SQL on HadoopApache Kylin - OLAP Cubes for SQL on Hadoop
Apache Kylin - OLAP Cubes for SQL on HadoopTed Dunning
 
Apache Arrow (Strata-Hadoop World San Jose 2016)
Apache Arrow (Strata-Hadoop World San Jose 2016)Apache Arrow (Strata-Hadoop World San Jose 2016)
Apache Arrow (Strata-Hadoop World San Jose 2016)Wes McKinney
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationKacy Clarke
 
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...AI Frontiers
 
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIs
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIsBIMachine Training - Gerenciando seus Indicadores com o recurso de KPIs
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIsSOL7 - Tecnologia de Decisão
 
Finanças e Investimentos para Startups - Startup Pirates Foz ´14
Finanças e Investimentos para Startups - Startup Pirates Foz ´14Finanças e Investimentos para Startups - Startup Pirates Foz ´14
Finanças e Investimentos para Startups - Startup Pirates Foz ´14Ricardo Moraes
 
Marcas e patentes
Marcas e patentesMarcas e patentes
Marcas e patentesbruno2m1
 
Chapter5
Chapter5Chapter5
Chapter5alipuko
 
Future in focus brazil mar2012 final
Future in focus brazil mar2012 finalFuture in focus brazil mar2012 final
Future in focus brazil mar2012 finalLeonardo Naressi
 
TCS SocialSoccer - England vs. Uruguay Prediction!
TCS SocialSoccer - England vs. Uruguay Prediction!TCS SocialSoccer - England vs. Uruguay Prediction!
TCS SocialSoccer - England vs. Uruguay Prediction!Tata Consultancy Services
 
Resume - Waell Sami Mohammed Said Masoud - 02-2017
Resume - Waell Sami Mohammed Said Masoud - 02-2017Resume - Waell Sami Mohammed Said Masoud - 02-2017
Resume - Waell Sami Mohammed Said Masoud - 02-2017waell masoud
 
Como dominar as suas emoções
Como dominar as suas emoçõesComo dominar as suas emoções
Como dominar as suas emoçõesEmanuel Francisco
 
Demonstrate Your Value and Get Paid for It - Marketwerks
Demonstrate Your Value and Get Paid for It   - MarketwerksDemonstrate Your Value and Get Paid for It   - Marketwerks
Demonstrate Your Value and Get Paid for It - MarketwerksMarketwerks, Inc.
 

Viewers also liked (20)

NEA Innovation Physics - Part 1
NEA Innovation Physics - Part 1NEA Innovation Physics - Part 1
NEA Innovation Physics - Part 1
 
Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature
Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature
Reduce Storage Costs by 5x Using The New HDFS Tiered Storage Feature
 
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
 
Apache Kylin - OLAP Cubes for SQL on Hadoop
Apache Kylin - OLAP Cubes for SQL on HadoopApache Kylin - OLAP Cubes for SQL on Hadoop
Apache Kylin - OLAP Cubes for SQL on Hadoop
 
Apache Arrow (Strata-Hadoop World San Jose 2016)
Apache Arrow (Strata-Hadoop World San Jose 2016)Apache Arrow (Strata-Hadoop World San Jose 2016)
Apache Arrow (Strata-Hadoop World San Jose 2016)
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
 
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...
Saket Saurabh at AI Frontiers: Data Operations or: How I Learned to Stop Data...
 
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIs
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIsBIMachine Training - Gerenciando seus Indicadores com o recurso de KPIs
BIMachine Training - Gerenciando seus Indicadores com o recurso de KPIs
 
Mi ofrenda
Mi ofrendaMi ofrenda
Mi ofrenda
 
Finanças e Investimentos para Startups - Startup Pirates Foz ´14
Finanças e Investimentos para Startups - Startup Pirates Foz ´14Finanças e Investimentos para Startups - Startup Pirates Foz ´14
Finanças e Investimentos para Startups - Startup Pirates Foz ´14
 
Marcas e patentes
Marcas e patentesMarcas e patentes
Marcas e patentes
 
Chapter5
Chapter5Chapter5
Chapter5
 
Future in focus brazil mar2012 final
Future in focus brazil mar2012 finalFuture in focus brazil mar2012 final
Future in focus brazil mar2012 final
 
TCS SocialSoccer - England vs. Uruguay Prediction!
TCS SocialSoccer - England vs. Uruguay Prediction!TCS SocialSoccer - England vs. Uruguay Prediction!
TCS SocialSoccer - England vs. Uruguay Prediction!
 
Resume - Waell Sami Mohammed Said Masoud - 02-2017
Resume - Waell Sami Mohammed Said Masoud - 02-2017Resume - Waell Sami Mohammed Said Masoud - 02-2017
Resume - Waell Sami Mohammed Said Masoud - 02-2017
 
Como dominar as suas emoções
Como dominar as suas emoçõesComo dominar as suas emoções
Como dominar as suas emoções
 
Guernsey CPD Company Law and Registry Update 14 September 16
Guernsey CPD Company Law and Registry Update 14 September 16Guernsey CPD Company Law and Registry Update 14 September 16
Guernsey CPD Company Law and Registry Update 14 September 16
 
Demonstrate Your Value and Get Paid for It - Marketwerks
Demonstrate Your Value and Get Paid for It   - MarketwerksDemonstrate Your Value and Get Paid for It   - Marketwerks
Demonstrate Your Value and Get Paid for It - Marketwerks
 
Liga 9 y 10 noviembre
Liga 9 y 10 noviembreLiga 9 y 10 noviembre
Liga 9 y 10 noviembre
 
Presentacion copia
Presentacion   copiaPresentacion   copia
Presentacion copia
 

Similar to Hugo Fiennes - Security and the IoT - Electric Imp

Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applicationseightbit
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applicationsmgianarakis
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applicationseightbit
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 

Similar to Hugo Fiennes - Security and the IoT - Electric Imp (20)

Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
IoT security
IoT securityIoT security
IoT security
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 

More from Business of Software Conference

BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your Job
BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your JobBoSUSA23 | Greg Baugues | Someone Using AI Will Take Your Job
BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your JobBusiness of Software Conference
 
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...Business of Software Conference
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBusiness of Software Conference
 
BoSON23 | Tim Wilkinson | Making First Hire Product Managers Work
BoSON23 | Tim Wilkinson | Making First Hire Product Managers WorkBoSON23 | Tim Wilkinson | Making First Hire Product Managers Work
BoSON23 | Tim Wilkinson | Making First Hire Product Managers WorkBusiness of Software Conference
 
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing Engine
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing EngineBoSON23 | Lucy Heskins | How To Use Your Product As A Marketing Engine
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing EngineBusiness of Software Conference
 
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote Companies
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote CompaniesBoSON23 | Alex Osterwalder | Coaching & Leadership in Remote Companies
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote CompaniesBusiness of Software Conference
 
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the World
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the WorldBoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the World
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the WorldBusiness of Software Conference
 
BoSEU24 | Imogen Wethered | How to Sell a Business in a Decade
BoSEU24 | Imogen Wethered | How to Sell a Business in a DecadeBoSEU24 | Imogen Wethered | How to Sell a Business in a Decade
BoSEU24 | Imogen Wethered | How to Sell a Business in a DecadeBusiness of Software Conference
 
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the Dying
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the DyingBoSEU24 | Eleanor Gunn | The Top Five Regrets of the Dying
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the DyingBusiness of Software Conference
 
BoSEU24 | Claire Suellentrop | How to Operationalise JTBD
BoSEU24 | Claire Suellentrop | How to Operationalise JTBDBoSEU24 | Claire Suellentrop | How to Operationalise JTBD
BoSEU24 | Claire Suellentrop | How to Operationalise JTBDBusiness of Software Conference
 
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem Shooting
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem ShootingBoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem Shooting
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem ShootingBusiness of Software Conference
 
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdf
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdfBoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdf
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdfBusiness of Software Conference
 

More from Business of Software Conference (20)

BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your Job
BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your JobBoSUSA23 | Greg Baugues | Someone Using AI Will Take Your Job
BoSUSA23 | Greg Baugues | Someone Using AI Will Take Your Job
 
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...
BoSUSA23 | Kyle Bazzy & Derik Sutton | Rethinking Sales From the Demand Side ...
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
 
BoSON23 | Tim Wilkinson | Making First Hire Product Managers Work
BoSON23 | Tim Wilkinson | Making First Hire Product Managers WorkBoSON23 | Tim Wilkinson | Making First Hire Product Managers Work
BoSON23 | Tim Wilkinson | Making First Hire Product Managers Work
 
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing Engine
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing EngineBoSON23 | Lucy Heskins | How To Use Your Product As A Marketing Engine
BoSON23 | Lucy Heskins | How To Use Your Product As A Marketing Engine
 
BoSON23 | Mark Gibson | Better B2B Sales
BoSON23 | Mark Gibson | Better B2B SalesBoSON23 | Mark Gibson | Better B2B Sales
BoSON23 | Mark Gibson | Better B2B Sales
 
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote Companies
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote CompaniesBoSON23 | Alex Osterwalder | Coaching & Leadership in Remote Companies
BoSON23 | Alex Osterwalder | Coaching & Leadership in Remote Companies
 
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the World
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the WorldBoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the World
BoSEU24 | Oyinda Bamgbose | How Tech Can Still Save the World
 
BoSEU24 | Ninnu Campbell | How to Make People Fail
BoSEU24 | Ninnu Campbell | How to Make People FailBoSEU24 | Ninnu Campbell | How to Make People Fail
BoSEU24 | Ninnu Campbell | How to Make People Fail
 
BoSEU24 | Joe Leech | Seven Traits of the Modern CEO
BoSEU24 | Joe Leech | Seven Traits of the Modern CEOBoSEU24 | Joe Leech | Seven Traits of the Modern CEO
BoSEU24 | Joe Leech | Seven Traits of the Modern CEO
 
BoSEU24 | Imogen Wethered | How to Sell a Business in a Decade
BoSEU24 | Imogen Wethered | How to Sell a Business in a DecadeBoSEU24 | Imogen Wethered | How to Sell a Business in a Decade
BoSEU24 | Imogen Wethered | How to Sell a Business in a Decade
 
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the Dying
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the DyingBoSEU24 | Eleanor Gunn | The Top Five Regrets of the Dying
BoSEU24 | Eleanor Gunn | The Top Five Regrets of the Dying
 
BoSEU24 | Claire Suellentrop | How to Operationalise JTBD
BoSEU24 | Claire Suellentrop | How to Operationalise JTBDBoSEU24 | Claire Suellentrop | How to Operationalise JTBD
BoSEU24 | Claire Suellentrop | How to Operationalise JTBD
 
BoSEU24 | Bruce McCarthy | Aligning Executive Teams
BoSEU24 | Bruce McCarthy | Aligning Executive TeamsBoSEU24 | Bruce McCarthy | Aligning Executive Teams
BoSEU24 | Bruce McCarthy | Aligning Executive Teams
 
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem Shooting
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem ShootingBoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem Shooting
BoSEU24 | Bob Moesta | Live JTBD Case Studies + Problem Shooting
 
BoSEU24 | Bill Thompson | Talk From Another Century
BoSEU24 | Bill Thompson | Talk From Another CenturyBoSEU24 | Bill Thompson | Talk From Another Century
BoSEU24 | Bill Thompson | Talk From Another Century
 
BoSUSA22 | Mikey Trafton | Finding Your Super Powers
BoSUSA22 | Mikey Trafton | Finding Your Super PowersBoSUSA22 | Mikey Trafton | Finding Your Super Powers
BoSUSA22 | Mikey Trafton | Finding Your Super Powers
 
BoSON22 | Tony Ulwick | The ‘JTBD Needs’ Framework
BoSON22 | Tony Ulwick | The ‘JTBD Needs’ FrameworkBoSON22 | Tony Ulwick | The ‘JTBD Needs’ Framework
BoSON22 | Tony Ulwick | The ‘JTBD Needs’ Framework
 
BoSON22 | Rita McGrath | Discovery Driven Planning
BoSON22 | Rita McGrath | Discovery Driven PlanningBoSON22 | Rita McGrath | Discovery Driven Planning
BoSON22 | Rita McGrath | Discovery Driven Planning
 
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdf
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdfBoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdf
BoSON22 | Rich Mironov | Resolving Incompatible World Views - Slides.pdf
 

Recently uploaded

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 

Recently uploaded (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 

Hugo Fiennes - Security and the IoT - Electric Imp

  • 1. 1 Security First: IoT Hugo Fiennes, Co-founder & CEO, electric imp
  • 2. Security First When you’re making a connected product, or a service that deals with connected products and their data, you need to consider security before any other aspect. Including privacy. Without security, there cannot be privacy. 2
  • 3. Why? This sort of thing is bad… 3
  • 4. Really, hackers are only just getting started with the IoT… 4 0 5 10 15 20 defcon 18 defcon 19 defcon 20 defcon 21 defcon 22 Number of IoT related sessions at the last 5 DEFCON conferences iot/scada car consumer embedded
  • 5. Why are there so many insecure connected products? • Security is not an area most product companies have experience with • They need to find and hire appropriate experts… • …and empower them to do possibly costly things with no immediate ROI • Product companies usually work serially: • Make product n, test/debug/optimize, ship • Make product n+1, test/debug/optimize, ship • Make product n+2, test/debug/optimize, ship 5
  • 6. Security is iterative, never “done” • Build/ship/forget only works when products don’t need to be updated • Generally, a manufacturer will only see a product again if it fails. • The entire engineering function is often not architected for sustaining engineering. • It fails to work with connected products • They do not ship into a static world • Threats and exploits change and evolve over time • The customer expects – and trusts the brand – to provide the same quality experience long after the product was purchased 6
  • 7. Dystopian future: consumer IoT in 5 years • Your home has become a wretched hive of scum and villainy • We must be cautious • Those cheap chinese power monitors you bought from eBay will be sending 419 spam. • Your dishwasher will be locked in a firmware upgrade loop. • Your lights can only be controlled by the phone you stopped using 4 years ago. 7
  • 8. Hmm. So that was depressing. What can be done? 8
  • 9. The first rule of IoT (club)… Products must be able to be upgraded securely, without end-user intervention. 9 (see: Belkin WeMo, Dlink, Almost every home router…)
  • 10. Second rule: start at product definition • Feature set • How can each feature be implemented securely, without breaking either the functionality or the user experience? • Setup process • How can a device be provisioned securely, and the ownership of the device be established? • Data flows • What is the appropriate level of protection for data flowing both from and to the device? 10
  • 11. Third rule: budget for it • Security maintenance is not free • It’s better than the alternative, though • Damage to your reputation is hard to price. • You need to be able to provide updates for the product lifetime • This means being able to regression test firmware and products that may have been out of production for many years. • This requires quite a bit of development discipline. • Ideally, having a way to safely EOL a product is good 11
  • 12. Security and things: Threat model • What attacks am I concerned about? • Physical: when attacker has physical access to the device • Local: when attacker has direct network access to the device • MITM: when attacker is between device and network • Server: when attacker targets the host service • What areas are high vulnerability? • Configuration/setup/provisioning modes are often less tested • Remnants of factory test modes are often insecure • How much cost can my design bear? • There are always trade-offs 12
  • 13. Security and things: Attack surface • The attack surface is the sum of all the possible vectors that could be used to compromise security • The smaller the attack surface, the easier it is to secure a product • A typical attack surface consists of several areas: • Hardware: JTAG, external memories, debug console, ISP/test connectors • Software: buffer overruns in bootloader, malformed TCP packets, illegal TLS negotiations or options, diagnostic modes, local control interfaces • Network: malformed link packets, insufficient entropy for key generation, diagnostic/setup ports, simplistic authentication schemes, etc • Once an entry point has been secured, the size of the attack surface is often irrelevant 13
  • 14. Example: Physical security Nothing is totally secure. Your job is to pick an appropriate level of paranoia. This often does not need to be an expensive effort. 14 Level Cost per unit Cost to hack Notes Zero $0.00 $0 Insecure bootloader, exposed JTAG or console UART, etc One $0.00 $1000+ Remove JTAG/console test points, remove your backdoors Two $0.25+ $100,000+ JTAG disabled with OTP fuse, secure bootloader, memory protection deployed appropriately Three $0.50+ ??? Unique, per-device authentication/encryption
  • 15. Security and things: Replicability • The most damaging hacks are the ones that can be replicated easily • It can be cost-prohibitive to prevent attackers with physical access from at least compromising the normal operation of a system • …but if an attacker with physical access can find a weakness and use it to devise an attack that does not require physical access, that’s bad. • For example: • Network attacks (buffer overflows, malformed data, etc) • MITM attacks (snoop on or alter traffic to/from devices) • Leaks of secrets shared by all devices (eg symmetric encryption keys) 15
  • 16. The last rule: Build, or buy, a platform Separating the application from the platform is a good thing. The platform remains common across products, reducing the cost of maintenance for each product and justifying more work on hardening the attack surface. This also insulates the application from the hardware, allowing consistency in development even for product refreshes and cost reductions. 16 Where What Application Application-specific logic, UI Platform Network stack, OS, drivers Hardware Physical security With a good architecture, most of the security work happens here
  • 17. Contractual Electric Imp mention Electric Imp is a cloud platform for people to build connected devices with. We deal with things like long-term maintenance, security, scalability, compatibility, link maintenance, cloud-based middleware, stupid routers and hardware abstraction. We work with people who want to build great connected products or services, but who rightly believe that spending all their time debugging networking and fixing security holes isn’t a good commercial strategy. 17
  • 18. Q&A (btw, I have slides from ARM techcon if you want a much more technical view – please ask!) ps: we are hiring… 18

Editor's Notes

  1. Based on my review, which is somewhat arbitrary in terms of bins
  2. A problem of alignment. Most product companies make money by selling new products vs looking after old ones.
  3. All futures are dystopian …but without Han Solo or lightsabers these are real worries security lack of updates obsolete interaction methods
  4. Users have better things to do with their time
  5. It’s very hard to “add security”. If hard-to-secure features are determined early enough, the problem becomes a lot easier.
  6. People leave companies. Whilst source control systems, continuous integration and system testing are commonplace in software development, they’re not so widespread in product companies.
  7. Depends on what you’re making, how valuable the data is, and what the consequences of a breach could be.
  8. This is why adding security is hard; if you start with nothing exposed, then you usually end up in a better place than starting with everything exposed and try to cut things off
  9. Obviously, the costs are made up and somewhat arbitrary depending on the number of things you’re making Shared secrets etc
  10. Costs: orders of magnitude different from IoT
  11. This is just like the OS/application split that the computer world has used forever, but is still fairly alien to many embedded developers Resource constraints do still exist, but it’s nothing like it used to be